A10 Thunder TPS Primary Use Case

David Mello - PeerSpot reviewer
Technology manager at Folha de S. Paolo

We have our own data center, and we perform load balancing for a lot of internal and external services using A10 Thunder TPS. For some users, we use A10 Thunder TPS for HTTP protocol. We perform load balancing for HTTPS on A10 Thunder TPS and others with too much workload we have to do on the servers. We cannot do the load balancing using HTTPS.

There is a limitation for SSL communication, but we had a problem with our application that started to hang. So, we had to change the SSL certificate to this server.

View full review »
BV
Managing Director Leaseweb Network at Leaseweb

As a cloud infrastructure and hosting company, we provide public and private cloud services. We use the A10 technology to protect our customers against DDoS attacks against their hosting instances. The latter could be dedicated servers or virtual servers or data storage platforms.

We have technology in place to detect attacks at the border routers of our networks in all 20 data centers worldwide where we operate. If we detect an attack, we reroute the traffic of the IP addresses that are being attacked to the A10 Thunder systems. They drop the malicious attack traffic and they pass through the legitimate traffic to the servers or the virtual servers that our customers use.

We deploy different types, different sizes of equipment. We use these solutions on-premises.

View full review »
Osman Nayan - PeerSpot reviewer
IP/DDOS Senior Engineer at Türk Telekom International

I use the solution to check the tickets and reports of the configuration site.

View full review »
Buyer's Guide
A10 Thunder TPS
April 2024
Learn what your peers think about A10 Thunder TPS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,667 professionals have used our research since 2012.
RM
Co-Founder at Acorus Networks

We work like an MSSP. We provide massive capacity and other network capacity to customers. We have customers connect anywhere on back burn. It can be in Europe. It can be in the US or in Asia. We plug the attack anywhere on the back burn, trying plug the attack closest to the source of the attack. So, we don't work like all the other guys who do scrubbing centers. We try to build a scrubbing network. That is why we need to buy more TPS in order to be distributive.

When we start to work with the customer, we don't know what they have. The goal for them is to be able to block any type of massive volume metric attack. The reason is why we have about a two terabytes capacity and are building to afford three to four terabytes of capacity. Therefore, anytime the customer needs to block something, we can configure for them any type of custom role.

We are using them for a mitigation offer that we have globally. We have a bunch of A10s and will deploy more in a few weeks.

We use both the hardware and software.

View full review »
DA
SOC Manager at a media company with 1,001-5,000 employees

We use it for DDoS mitigation. Availability is extremely critical to our business. We provide online services for two, large video game titles, so there's a requirement to keep our game online and for our players to be able to play the game.

We use it on-prem.

View full review »
SA
Director of Technology at a comms service provider with 51-200 employees

Thunder TPS protects your network from DDoS attacks. 

View full review »
TD
Director of IT Networks at a comms service provider with 201-500 employees

We use it for DDoS mitigation. First of all, we decided that outsourcing it or putting it out into the cloud was just too expensive, so we decided to build our own scrubbing center rather than outsource it to somebody else. We use it to protect against DDoS attacks.

It's on-prem.

View full review »
TP
Ethernet IP Engineer at a comms service provider with 11-50 employees

Availability is very critical for us. We use it to mitigate DDoS attacks for rural North Dakota. We really don't use it to identify attacks, we use third-party software, a Kentik solution, to identify anomalies within the IP stack. Then, we turn around and send mitigation profiles to the A10 based on an API call, and the A10 initializes a BGP session to our core routers to offload that traffic and mitigate it.

We provide hosted solutions so our deployment of A10 is private cloud.

View full review »
OL
Security IT at a financial services firm with 201-500 employees

We use A10 Thunder TPS for load balancing, especially server load balancing.


View full review »
Ahmed Madibbo - PeerSpot reviewer
Professional Services Consultant at a wholesaler/distributor with 10,001+ employees

We are the main distributor for A10 Networks. It is used as an appliance. It is mainly used to identify problems in the network. It helps us to stop any type of DDoS attack.

We are using its latest version.

View full review »
Jaffar Ali - PeerSpot reviewer
Director Technical Services at TechnoBIZ

Our primary use case is for our support ticketing and invoice generation. We're resellers and we provide it to our customers. 

Our other use cases are for keeping a record of all the invoices and we use it for our sales to track the accrued sales. 

View full review »
JJ
Technical Consultant at Westcon

One of the largest persistent threats to service uptime is Distributed Denial of Service Attacks (DDoS). The networking industry and business analysts are seeing a trend in increasing DDoS attacks. These attacks are occurring more frequently and with greater intensity and increased sophistication. Legacy DDoS protection solutions suffer from the following fatal limitations that have made them ineffective at protecting against these attacks:

• Lack of flexibility

• Inability to scale

View full review »
Buyer's Guide
A10 Thunder TPS
April 2024
Learn what your peers think about A10 Thunder TPS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,667 professionals have used our research since 2012.